Hello @Avi Stokar ,
Thank you for the details but I would like to know which resource is associated to the Static IP address.
When you say the static IP is registered with 3rd party for their whitelisting, I believe you are referring to a Static Public IP. So, is this static Public IP associated to the Azure Firewall?
If this Static Public IP is associated to the Azure Firewall, then you need to follow the below doc:
You can change the public IP address associated with the firewall but note that a firewall must have at least one public IP address associated with its configuration. Also, you can't update the IP address if the firewall's existing IP has any destination network address translation (DNAT) rules associated with it.
So, if you would like to retain the existing Static IP address associated with the Azure Firewall and stop the Azure Firewall for cost reduction, then you need to first change the IP address of the Azure Firewall.
To stop Azure Firewall, refer: https://learn.microsoft.com/en-us/azure/firewall/firewall-faq#how-can-i-stop-and-start-azure-firewall
But to make sure that the app is still accessible using the existing static IP, you would need to associate it back to a resource depending upon your requirement.
You could either add it directly to your app if you are using an Azure App service.
https://learn.microsoft.com/en-us/azure/app-service/configure-ssl-bindings
Or you need to introduce another resource which can help you with the inbound connections, such as Azure Application gateway, Load balancer, Front Door etc.
If you could share your exact setup with the traffic flow from the 3rd party to the app and the new requirement, we can discuss it further.
Kindly let us know if the above helps or you need further assistance on this issue.
Please "Accept the answer" if the information helped you. This will help us and others in the community as well.